On Monday, March 15, 1999 3:23 AM, Glynn Clements [SMTP:[EMAIL PROTECTED]] 
wrote:
>
> Adam Neat wrote:
>
> > does anyone know of a way to easily trace syn flooding, dos, smurf and
> > other types of traiffc on a network?
>
> What do you mean by `trace'? If you want to find where it came from,
> the answer is that you can't. Attacks which don't require the sender
> to receive any data can (and therefore do) use a spoofed source
> address.
>
> ICMP-flooding attacks can be logged with icmplogd. There may be
> something similar for SYN-flooding, but I don't know offhand.
>
> --
> Glynn Clements <[EMAIL PROTECTED]>

hello glynn,

well - it may be part of my personal naivity on Smurfing.

Basically a client of ours who is using Linux (we do to for ethernet 
routers) we believe is getting smurfing or the blunt end of a DOS attack of 
some type.

We want to try and work out how to

a) find out if this is the case

and

b) if its there, how do stop it.

does this help?

regards

adam


------------------------------------------------
                  IPAX Systems
              Melbourne, Australia
            National Systems Manager
            Ops Tel:   1800 894 894
            Ops Fax:  03 - 9801-8533
        Web Site http://www.ipax.com.au
------------------------------------------------


-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to